

y≡x.sup.2 mod N (1)
x.sub.p ≡y.sup.(p+1)/4 mod p, and x.sub.q ≡y.sup.(q+1)/4 mod q,(2)
then
x.sub.p.sup.2 ≡y mod p, (3)
x.sub.q.sup.2 ≡y mod q (4)
x≡x.sub.p ·q·1.sub.i +x.sub.1 ·p·p.sub.i mod pq, (5)
q.sub.i ≡q.sup.-1 mod p, and p.sub.i ≡p.sup.-1 mod q. (6)
P.sup.v.sub.a ·V.sup.w ≡α.sup.m mod N.sub.S(9)
S.sub.a ·v+r·w≡m mod φ(N.sub.S)(10)
w≡(m-S.sub.a v)·r.sup.-1 mod φ(N.sub.s) (11)
P.sub.i.sup.v v.sup.w ≡α.sup.m mod N.sub.s
w=(m-S.sub.i v)*r.sup.-1 mod φ(N.sub.s)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US08/026,673US5299263A (en) | 1993-03-04 | 1993-03-04 | Two-way public key authentication and key agreement for low-cost terminals |
| US08/101,437US5406628A (en) | 1993-03-04 | 1993-08-02 | Public key authentication and key agreement for low-cost terminals |
| CA002157011ACA2157011C (en) | 1993-03-04 | 1994-02-25 | Method for two-way public key authentication and key agreement for low-cost terminals |
| EP94909772AEP0691055B1 (en) | 1993-03-04 | 1994-02-25 | Two-way public key authentication and key agreement for low-cost terminals |
| JP6520043AJPH08507619A (en) | 1993-03-04 | 1994-02-25 | Two-way public key verification and key matching for low cost terminals |
| DE69426416TDE69426416T2 (en) | 1993-03-04 | 1994-02-25 | BIDIRECTIONAL AUTHENTICATION WITH PUBLIC KEY AND KEY AGREEMENT FOR COST-EFFECTIVE TERMINALS |
| PCT/US1994/001968WO1994021067A1 (en) | 1993-03-04 | 1994-02-25 | Two-way public key authentication and key agreement for low-cost terminals |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US08/026,673US5299263A (en) | 1993-03-04 | 1993-03-04 | Two-way public key authentication and key agreement for low-cost terminals |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US08/101,437Continuation-In-PartUS5406628A (en) | 1993-03-04 | 1993-08-02 | Public key authentication and key agreement for low-cost terminals |
| Publication Number | Publication Date |
|---|---|
| US5299263Atrue US5299263A (en) | 1994-03-29 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US08/026,673Expired - LifetimeUS5299263A (en) | 1993-03-04 | 1993-03-04 | Two-way public key authentication and key agreement for low-cost terminals |
| US08/101,437Expired - LifetimeUS5406628A (en) | 1993-03-04 | 1993-08-02 | Public key authentication and key agreement for low-cost terminals |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US08/101,437Expired - LifetimeUS5406628A (en) | 1993-03-04 | 1993-08-02 | Public key authentication and key agreement for low-cost terminals |
| Country | Link |
|---|---|
| US (2) | US5299263A (en) |
| EP (1) | EP0691055B1 (en) |
| JP (1) | JPH08507619A (en) |
| CA (1) | CA2157011C (en) |
| DE (1) | DE69426416T2 (en) |
| WO (1) | WO1994021067A1 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5414772A (en)* | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
| US5420927A (en)* | 1994-02-01 | 1995-05-30 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
| DE4416253A1 (en)* | 1994-05-07 | 1995-11-09 | Deutsche Bundespost Telekom | Data protection technique testing authenticity and integrity of coded information |
| US5475758A (en)* | 1993-01-22 | 1995-12-12 | Fujitsu Limited | User authenticating system and method in wide area distributed environment |
| US5491749A (en)* | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks |
| US5491750A (en)* | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
| US5497422A (en)* | 1993-09-30 | 1996-03-05 | Apple Computer, Inc. | Message protection mechanism and graphical user interface therefor |
| US5511121A (en)* | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
| US5515441A (en)* | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
| WO1996025814A1 (en)* | 1994-01-11 | 1996-08-22 | David Chaum | Multi-purpose transaction card system |
| US5555551A (en)* | 1993-06-29 | 1996-09-10 | Airtouch Communications, Inc. | Method and apparatus for fraud control in cellular telephone systems |
| US5557765A (en)* | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for data recovery |
| US5557678A (en)* | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
| US5559887A (en)* | 1994-09-30 | 1996-09-24 | Electronic Payment Service | Collection of value from stored value systems |
| US5577121A (en)* | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
| US5588061A (en)* | 1994-07-20 | 1996-12-24 | Bell Atlantic Network Services, Inc. | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
| US5600725A (en)* | 1993-08-17 | 1997-02-04 | R3 Security Engineering Ag | Digital signature method and key agreement method |
| US5600722A (en)* | 1993-10-06 | 1997-02-04 | Nippon Telegraph & Telephone Corp. | System and scheme of cipher communication |
| US5604804A (en)* | 1996-04-23 | 1997-02-18 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
| US5606609A (en)* | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
| US5610982A (en)* | 1996-05-15 | 1997-03-11 | Micali; Silvio | Compact certification with threshold signatures |
| US5633930A (en)* | 1994-09-30 | 1997-05-27 | Electronic Payment Services, Inc. | Common cryptographic key verification in a transaction network |
| US5638447A (en)* | 1996-05-15 | 1997-06-10 | Micali; Silvio | Compact digital signatures |
| US5715518A (en)* | 1996-03-06 | 1998-02-03 | Cellular Technical Services Company, Inc. | Adaptive waveform matching for use in transmitter identification |
| DE19640526A1 (en)* | 1996-10-01 | 1998-04-02 | Deutsche Telekom Ag | Process for the transmission of signals |
| US5737419A (en)* | 1994-11-09 | 1998-04-07 | Bell Atlantic Network Services, Inc. | Computer system for securing communications using split private key asymmetric cryptography |
| US5748735A (en)* | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
| US5757924A (en)* | 1995-09-18 | 1998-05-26 | Digital Secured Networks Techolognies, Inc. | Network security device which performs MAC address translation without affecting the IP address |
| US5761305A (en)* | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| WO1998026535A1 (en)* | 1996-12-12 | 1998-06-18 | Intel Corporation | Cryptographically protected paging subsystem |
| US5778072A (en)* | 1995-07-07 | 1998-07-07 | Sun Microsystems, Inc. | System and method to transparently integrate private key operations from a smart card with host-based encryption services |
| US5812669A (en)* | 1995-07-19 | 1998-09-22 | Jenkins; Lew | Method and system for providing secure EDI over an open network |
| US5819171A (en)* | 1995-08-31 | 1998-10-06 | Cellular Technical Services Co., Inc. | Automated forced call disruption for use with wireless telephone systems |
| US5838792A (en)* | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
| US5850444A (en)* | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
| US5875394A (en)* | 1996-12-27 | 1999-02-23 | At & T Wireless Services Inc. | Method of mutual authentication for secure wireless service provision |
| US5878122A (en)* | 1997-02-07 | 1999-03-02 | Northern Telecom Limited | Long distance service bureau |
| US5889865A (en)* | 1995-05-17 | 1999-03-30 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
| US5893031A (en)* | 1996-06-27 | 1999-04-06 | Cellular Technical Services Company, Inc. | System and method for collection of transmission characteristics |
| WO1999019844A1 (en)* | 1997-10-08 | 1999-04-22 | Kutalkova Sarka | A method of communication between an external terminal of a bank account user and an internal terminal of a banking system by means of a telephone network and a device for carrying out the method |
| US5905799A (en)* | 1994-07-20 | 1999-05-18 | Bell Atlantic Network Services, Inc. | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
| US5915021A (en)* | 1997-02-07 | 1999-06-22 | Nokia Mobile Phones Limited | Method for secure communications in a telecommunications system |
| US5924025A (en)* | 1996-10-25 | 1999-07-13 | Cellular Technical Services Company, Inc. | System and method for detection of redial fraud in a cellular telephone system |
| US5933504A (en)* | 1995-05-18 | 1999-08-03 | Certicom Corp. | Strengthened public key protocol |
| US5940751A (en)* | 1996-06-27 | 1999-08-17 | Cellular Technical Services Company, Inc. | System and method for detection of fraud in a wireless telephone system |
| US5950121A (en)* | 1993-06-29 | 1999-09-07 | Airtouch Communications, Inc. | Method and apparatus for fraud control in cellular telephone systems |
| US5953420A (en)* | 1996-10-25 | 1999-09-14 | International Business Machines Corporation | Method and apparatus for establishing an authenticated shared secret value between a pair of users |
| US5956403A (en)* | 1994-08-11 | 1999-09-21 | Network Association, Inc. | System and method for access field verification |
| US5956635A (en)* | 1996-07-16 | 1999-09-21 | Cellular Technical Services Company, Inc. | Detection and prevention of channel grabbing in a wireless communications system |
| US5956634A (en)* | 1997-02-28 | 1999-09-21 | Cellular Technical Services Company, Inc. | System and method for detection of fraud in a wireless telephone system |
| US5970405A (en)* | 1997-02-28 | 1999-10-19 | Cellular Technical Services Co., Inc. | Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis |
| EP0682327A3 (en)* | 1994-05-09 | 1999-11-03 | Yeda Research And Development Company, Ltd. | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
| DE19820605A1 (en)* | 1998-05-08 | 1999-11-11 | Giesecke & Devrient Gmbh | Method for secure distribution of software |
| US5999806A (en)* | 1997-02-28 | 1999-12-07 | Cellular Technical Services Company, Inc. | Waveform collection for use in wireless telephone identification |
| US5999807A (en)* | 1997-02-28 | 1999-12-07 | Cellular Technical Services Company, Inc. | System and method for the verification of authentic telephone numbers in a wireless telephone system |
| US6026167A (en)* | 1994-06-10 | 2000-02-15 | Sun Microsystems, Inc. | Method and apparatus for sending secure datagram multicasts |
| US6052466A (en)* | 1997-08-28 | 2000-04-18 | Telefonaktiebolaget L M Ericsson (Publ) | Encryption of data packets using a sequence of private keys generated from a public key exchange |
| US6058301A (en)* | 1996-11-27 | 2000-05-02 | Airtouch Communications, Inc. | Cellular fraud prevention using selective roaming |
| EP0845760A3 (en)* | 1996-11-21 | 2000-07-26 | Pitney Bowes Inc. | Method for verifying the expected postage security device in a host system |
| EP0845761A3 (en)* | 1996-11-21 | 2000-09-13 | Pitney Bowes Inc. | Method for verifying the expected postage security device and an authorized host system |
| EP0845762A3 (en)* | 1996-11-21 | 2000-10-11 | Pitney Bowes Inc. | Method for verifying the expected postal security device in a postal security device |
| US6134431A (en)* | 1996-10-07 | 2000-10-17 | Hitachi, Ltd. | Personal station authentication system and authentication method |
| US6134597A (en)* | 1997-05-28 | 2000-10-17 | International Business Machines Corporation | CRC hash compressed server object identifier |
| US6178506B1 (en) | 1998-10-23 | 2001-01-23 | Qualcomm Inc. | Wireless subscription portability |
| US6178507B1 (en)* | 1997-02-03 | 2001-01-23 | Certicom Corp. | Data card verification system |
| US6240513B1 (en)* | 1997-01-03 | 2001-05-29 | Fortress Technologies, Inc. | Network security device |
| US6247129B1 (en) | 1997-03-12 | 2001-06-12 | Visa International Service Association | Secure electronic commerce employing integrated circuit cards |
| US6272632B1 (en) | 1995-02-21 | 2001-08-07 | Network Associates, Inc. | System and method for controlling access to a user secret using a key recovery field |
| US6292896B1 (en) | 1997-01-22 | 2001-09-18 | International Business Machines Corporation | Method and apparatus for entity authentication and session key generation |
| US6349338B1 (en)* | 1999-03-02 | 2002-02-19 | International Business Machines Corporation | Trust negotiation in a client/server data processing network using automatic incremental credential disclosure |
| US6408175B1 (en)* | 1998-03-03 | 2002-06-18 | Lg Information & Communications Ltd. | Method of managing mobile station operational parameters |
| US20020081994A1 (en)* | 2000-12-27 | 2002-06-27 | Kabushiki Kaisha Toshiba. | Communication apparatus, and authentication method of the same |
| US20020087483A1 (en)* | 2000-12-29 | 2002-07-04 | Shlomi Harif | System, method and program for creating and distributing processes in a heterogeneous network |
| US20020087481A1 (en)* | 2000-12-29 | 2002-07-04 | Shlomi Harif | System, method and program for enabling an electronic commerce heterogeneous network |
| US6424701B1 (en)* | 1998-01-30 | 2002-07-23 | Alcatel | Method and equipment for intercepting telephone calls |
| US20020107798A1 (en)* | 2000-06-08 | 2002-08-08 | Patrice Hameau | Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor |
| US6442532B1 (en)* | 1995-11-13 | 2002-08-27 | Transaction Technology Inc. | Wireless transaction and information system |
| US20020128972A1 (en)* | 1994-11-23 | 2002-09-12 | Contentguard Holdings, Inc. | Digital works having usage rights and method for creating the same |
| US6453159B1 (en)* | 1999-02-25 | 2002-09-17 | Telxon Corporation | Multi-level encryption system for wireless network |
| US20020162004A1 (en)* | 2001-04-25 | 2002-10-31 | Gunter Carl A. | Method and system for managing access to services |
| US20020162002A1 (en)* | 2001-04-25 | 2002-10-31 | Gunter Carl A. | Method and system for controlling access to services |
| US20020158904A1 (en)* | 2001-04-25 | 2002-10-31 | Gunter Carl A. | Method for automatically generating list of meeting participants and delegation permission |
| US20020162019A1 (en)* | 2001-04-25 | 2002-10-31 | Berry Michael C. | Method and system for managing access to services |
| US20020165824A1 (en)* | 1995-10-02 | 2002-11-07 | Silvio Micali | Scalable certificate validation and simplified PKI management |
| US20020169988A1 (en)* | 2000-12-22 | 2002-11-14 | Vandergeest Ron J. | Method and apparatus for providing user authentication using a back channel |
| US20030005327A1 (en)* | 2001-06-29 | 2003-01-02 | Julian Durand | System for protecting copyrighted materials |
| KR20030008453A (en)* | 2001-07-18 | 2003-01-29 | 주식회사 더블유에스랩 | Method of inter-authentication and security service using user-password in SMS for CDMA network |
| US6526506B1 (en) | 1999-02-25 | 2003-02-25 | Telxon Corporation | Multi-level encryption access point for wireless network |
| US6532451B1 (en) | 1998-03-23 | 2003-03-11 | Novell, Inc. | Nested strong loader apparatus and method |
| US20030065956A1 (en)* | 2001-09-28 | 2003-04-03 | Abhijit Belapurkar | Challenge-response data communication protocol |
| US20030115144A1 (en)* | 1994-11-23 | 2003-06-19 | Stefik Mark J. | Digital work structure |
| US6615350B1 (en) | 1998-03-23 | 2003-09-02 | Novell, Inc. | Module authentication and binding library extensions |
| US20030172299A1 (en)* | 2002-03-05 | 2003-09-11 | Gunter Carl A. | Method and system for maintaining secure access to web server services using permissions |
| US20030182559A1 (en)* | 2002-03-22 | 2003-09-25 | Ian Curry | Secure communication apparatus and method for facilitating recipient and sender activity delegation |
| US20030200447A1 (en)* | 2001-08-17 | 2003-10-23 | Lotta Almroth | Identification system |
| US20030236977A1 (en)* | 2001-04-25 | 2003-12-25 | Levas Robert George | Method and system for providing secure access to applications |
| US20040005059A1 (en)* | 2001-11-05 | 2004-01-08 | Yoshihiko Suzuki | Correspondence education system and correspondence education method |
| KR20040017487A (en)* | 2002-08-21 | 2004-02-27 | 이창우 | Authenticating method using public key cryptosystem |
| US6701433B1 (en) | 1998-03-23 | 2004-03-02 | Novell, Inc. | Method and apparatus for escrowing properties used for accessing executable modules |
| US6738907B1 (en) | 1998-01-20 | 2004-05-18 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
| KR20040042123A (en)* | 2002-11-13 | 2004-05-20 | 주식회사 퓨쳐시스템 | Portable authentication apparatus and authentication method using the same |
| US6751735B1 (en) | 1998-03-23 | 2004-06-15 | Novell, Inc. | Apparatus for control of cryptography implementations in third party applications |
| KR100449572B1 (en)* | 2002-05-22 | 2004-09-22 | 주식회사 케이티프리텔 | Method and system for performing mutual authenticating between mobile terminal and server |
| US20040237031A1 (en)* | 2003-05-13 | 2004-11-25 | Silvio Micali | Efficient and secure data currentness systems |
| US20050010783A1 (en)* | 1995-10-24 | 2005-01-13 | Phil Libin | Access control |
| EP1496644A3 (en)* | 1995-04-21 | 2005-02-09 | Certicom Corp. | Method for signature and session key generation |
| US20050055567A1 (en)* | 1995-10-02 | 2005-03-10 | Phil Libin | Controlling access to an area |
| US20050055548A1 (en)* | 1995-10-24 | 2005-03-10 | Silvio Micali | Certificate revocation system |
| US6886095B1 (en) | 1999-05-21 | 2005-04-26 | International Business Machines Corporation | Method and apparatus for efficiently initializing secure communications among wireless devices |
| US20050149450A1 (en)* | 1994-11-23 | 2005-07-07 | Contentguard Holdings, Inc. | System, method, and device for controlling distribution and use of digital works based on a usage rights grammar |
| US20050154918A1 (en)* | 2003-11-19 | 2005-07-14 | David Engberg | Distributed delegated path discovery and validation |
| US20050154879A1 (en)* | 2004-01-09 | 2005-07-14 | David Engberg | Batch OCSP and batch distributed OCSP |
| US20050204139A1 (en)* | 2004-03-10 | 2005-09-15 | Helland Patrick J. | Service broker security |
| US20050210263A1 (en)* | 2001-04-25 | 2005-09-22 | Levas Robert G | Electronic form routing and data capture system and method |
| EP1601154A1 (en)* | 2004-05-28 | 2005-11-30 | Sap Ag | Client authentication using a challenge provider |
| EP1601153A3 (en)* | 2004-05-28 | 2006-01-04 | Sap Ag | Client authentication using a challenge provider |
| US20060053291A1 (en)* | 2004-09-07 | 2006-03-09 | Brown Michael K | System and method for updating message trust status |
| US20060075234A1 (en)* | 2004-10-04 | 2006-04-06 | Samsung Electronics Co., Ltd. | Method of authenticating device using broadcast cryptography |
| US20060093138A1 (en)* | 2004-10-29 | 2006-05-04 | Alain Durand | Secure authenticated channel |
| US20060097843A1 (en)* | 2004-11-10 | 2006-05-11 | Phil Libin | Actuating a security system using a wireless device |
| KR100619005B1 (en)* | 1999-11-25 | 2006-08-31 | 삼성전자주식회사 | Authentication method for establishing connection between devices |
| US7117180B1 (en) | 1994-11-23 | 2006-10-03 | Contentguard Holdings, Inc. | System for controlling the use of digital works using removable content repositories |
| US20060271915A1 (en)* | 2005-05-24 | 2006-11-30 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US20070011453A1 (en)* | 2005-07-07 | 2007-01-11 | Nokia Corporation | Establishment of a trusted relationship between unknown communication parties |
| US20070028952A1 (en)* | 2005-08-05 | 2007-02-08 | Outdoor Sleep System, Llc | Sleeping bag and system |
| US7215773B1 (en) | 1998-10-14 | 2007-05-08 | Certicom.Corp. | Key validation scheme |
| US20070211893A1 (en)* | 2006-03-09 | 2007-09-13 | Motorola, Inc. | Encryption and verification using partial public key |
| US20080005030A1 (en)* | 2006-06-30 | 2008-01-03 | Scientific-Atlanta, Inc. | Secure Escrow and Recovery of Media Device Content Keys |
| US20080002825A1 (en)* | 2006-06-30 | 2008-01-03 | Shay Gueron | Method and a system for a quick verification rabin signature scheme |
| US7337315B2 (en) | 1995-10-02 | 2008-02-26 | Corestreet, Ltd. | Efficient certificate revocation |
| US7353396B2 (en) | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
| US20080098225A1 (en)* | 2006-10-19 | 2008-04-24 | Mark Wayne Baysinger | System and method for authenticating remote server access |
| US20080162940A1 (en)* | 1995-04-21 | 2008-07-03 | Vanstone Scott A | Key Agreement and Transport Protocol With Implicit Signatures |
| US20080162938A1 (en)* | 1995-04-21 | 2008-07-03 | Marinus Struik | Key agreement and transport protocol |
| US7409704B1 (en)* | 1999-07-15 | 2008-08-05 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for local policy enforcement for internet service providers |
| US20080256358A1 (en)* | 2007-04-12 | 2008-10-16 | Xerox Corporation | System and method for managing digital certificates on a remote device |
| WO2009023550A1 (en)* | 2007-08-14 | 2009-02-19 | Yeda Research & Development Co. Ltd. | A method and apparatus for implementing a novel one-way hash function on highly constrained devices such as rfid tags |
| US20090150671A1 (en)* | 2007-12-06 | 2009-06-11 | Hiroshi Abe | Communication system and communication terminal device |
| US7567669B2 (en) | 1996-05-17 | 2009-07-28 | Certicom Corp. | Strengthened public key protocol |
| US7600129B2 (en) | 1995-10-02 | 2009-10-06 | Corestreet, Ltd. | Controlling access using additional data |
| US20100067698A1 (en)* | 2008-09-10 | 2010-03-18 | Lg Electronics Inc. | Method for selectively encrypting control signal |
| US7716486B2 (en) | 1995-10-02 | 2010-05-11 | Corestreet, Ltd. | Controlling group access to doors |
| US20110191129A1 (en)* | 2010-02-04 | 2011-08-04 | Netzer Moriya | Random Number Generator Generating Random Numbers According to an Arbitrary Probability Density Function |
| US20110197068A1 (en)* | 1996-07-30 | 2011-08-11 | Holden James M | Methods for providing security over untrusted networks |
| US20110213711A1 (en)* | 2010-03-01 | 2011-09-01 | Entrust, Inc. | Method, system and apparatus for providing transaction verification |
| US8015597B2 (en) | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
| US8204945B2 (en) | 2000-06-19 | 2012-06-19 | Stragent, Llc | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
| US20120172002A1 (en)* | 2008-07-15 | 2012-07-05 | Lg Electronics Inc. | Method of supporting location privacy |
| US8261319B2 (en) | 1995-10-24 | 2012-09-04 | Corestreet, Ltd. | Logging access attempts to an area |
| US20130227290A1 (en)* | 2012-02-27 | 2013-08-29 | Kabushiki Kaisha Toshiba | Communication Apparatus and Communication Method |
| US8621227B2 (en) | 2010-12-28 | 2013-12-31 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
| US8656484B2 (en) | 2010-12-28 | 2014-02-18 | Authernative, Inc. | System and method for mutually authenticated cryptographic key exchange using matrices |
| US20140235207A1 (en)* | 2000-05-26 | 2014-08-21 | Ipcom Gmbh & Co. Kg | Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network |
| US20150195275A1 (en)* | 2010-10-06 | 2015-07-09 | Prima Cinema, Inc. | Secure device authentication protocol |
| EP2940883A3 (en)* | 2014-04-29 | 2016-01-27 | LSIS Co., Ltd. | Power system |
| US9277295B2 (en) | 2006-06-16 | 2016-03-01 | Cisco Technology, Inc. | Securing media content using interchangeable encryption key |
| WO2017065903A1 (en)* | 2015-10-14 | 2017-04-20 | Sony Interactive Entertainment America Llc | Fast multicast messaging encryption and authentication |
| US20170366349A1 (en)* | 2016-06-16 | 2017-12-21 | International Business Machines Corporation | Proofs of Plaintext Knowledge and Group Signatures Incorporating Same |
| US9973342B2 (en)* | 2016-06-16 | 2018-05-15 | International Business Machines Corporation | Authentication via group signatures |
| US10205598B2 (en)* | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
| US10339278B2 (en) | 2015-11-04 | 2019-07-02 | Screening Room Media, Inc. | Monitoring nearby mobile computing devices to prevent digital content misuse |
| US10452819B2 (en) | 2017-03-20 | 2019-10-22 | Screening Room Media, Inc. | Digital credential system |
| USRE49334E1 (en) | 2005-10-04 | 2022-12-13 | Hoffberg Family Trust 2 | Multifactorial optimization system and method |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7028187B1 (en)* | 1991-11-15 | 2006-04-11 | Citibank, N.A. | Electronic transaction apparatus for electronic commerce |
| US5493614A (en)* | 1994-05-03 | 1996-02-20 | Chaum; David | Private signature and proof systems |
| US5588060A (en)* | 1994-06-10 | 1996-12-24 | Sun Microsystems, Inc. | Method and apparatus for a key-management scheme for internet protocols |
| US5787175A (en)* | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
| US5999626A (en)* | 1996-04-16 | 1999-12-07 | Certicom Corp. | Digital signatures on a smartcard |
| US6901509B1 (en) | 1996-05-14 | 2005-05-31 | Tumbleweed Communications Corp. | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data |
| US5903651A (en)* | 1996-05-14 | 1999-05-11 | Valicert, Inc. | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data |
| US5841864A (en)* | 1996-08-05 | 1998-11-24 | Motorola Inc. | Apparatus and method for authentication and session key exchange in a communication system |
| US6377691B1 (en)* | 1996-12-09 | 2002-04-23 | Microsoft Corporation | Challenge-response authentication and key exchange for a connectionless security protocol |
| US6154541A (en)* | 1997-01-14 | 2000-11-28 | Zhang; Jinglong F | Method and apparatus for a robust high-speed cryptosystem |
| DE19702049C1 (en)* | 1997-01-22 | 1998-05-14 | Ibm | Chipcard cryptographic key certification method |
| US6125185A (en)* | 1997-05-27 | 2000-09-26 | Cybercash, Inc. | System and method for encryption key generation |
| JP3595109B2 (en)* | 1997-05-28 | 2004-12-02 | 日本ユニシス株式会社 | Authentication device, terminal device, authentication method in those devices, and storage medium |
| EP0892520A3 (en) | 1997-07-17 | 2001-10-17 | Matsushita Electric Industrial Co., Ltd. | Elliptic curve calculation apparatus capable of calculating multiples at high speed |
| US6073237A (en)* | 1997-11-06 | 2000-06-06 | Cybercash, Inc. | Tamper resistant method and apparatus |
| US6151676A (en)* | 1997-12-24 | 2000-11-21 | Philips Electronics North America Corporation | Administration and utilization of secret fresh random numbers in a networked environment |
| CA2255285C (en)* | 1998-12-04 | 2009-10-13 | Certicom Corp. | Enhanced subscriber authentication protocol |
| US6804778B1 (en)* | 1999-04-15 | 2004-10-12 | Gilian Technologies, Ltd. | Data quality assurance |
| DE60029217T2 (en)* | 1999-05-21 | 2007-05-31 | International Business Machines Corp. | METHOD AND DEVICE FOR INITIALIZING SAFE CONNECTIONS BETWEEN AND BETWEEN ONLY CUSTOMIZED CORDLESS EQUIPMENT |
| WO2001013201A2 (en)* | 1999-08-12 | 2001-02-22 | Sarnoff Corporation | Peer-to-peer network user authentication protocol |
| AU2424401A (en)* | 1999-11-03 | 2001-05-14 | Motorola, Inc. | A method for validating an application for use in a mobile communication device |
| US7076061B1 (en) | 2000-02-07 | 2006-07-11 | Citibank, N.A. | Efficient and compact subgroup trace representation (“XTR”) |
| US20050213758A1 (en)* | 2000-02-07 | 2005-09-29 | Lenstra Arjen K | Efficient and compact subgroup trace representation ("XTR") |
| US7017189B1 (en)* | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
| FR2821225B1 (en)* | 2001-02-20 | 2005-02-04 | Mobileway | REMOTE ELECTRONIC PAYMENT SYSTEM |
| US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
| US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
| US6889210B1 (en)* | 2001-12-12 | 2005-05-03 | Pss Systems, Inc. | Method and system for managing security tiers |
| USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
| US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
| US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
| US7478418B2 (en) | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
| US7631184B2 (en)* | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
| US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
| US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
| US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
| US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
| US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
| US7562232B2 (en)* | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
| US7783765B2 (en)* | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
| US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
| US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
| US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
| US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
| US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
| US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
| US7748045B2 (en)* | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
| US8613102B2 (en)* | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
| US7073068B2 (en)* | 2002-05-24 | 2006-07-04 | Lucent Technologies Inc. | Method and apparatus for distributing shares of a password for use in multi-server password authentication |
| US20030233584A1 (en)* | 2002-06-14 | 2003-12-18 | Microsoft Corporation | Method and system using combinable computational puzzles as challenges to network entities for identity check |
| KR100456624B1 (en)* | 2002-08-09 | 2004-11-10 | 한국전자통신연구원 | Authentication and key agreement scheme for mobile network |
| US20040203868A1 (en)* | 2002-08-14 | 2004-10-14 | Eidson John C. | Measurement authentication |
| US7221757B2 (en)* | 2002-08-15 | 2007-05-22 | Opentv, Inc. | Method and system for accelerated data encryption |
| US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
| US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
| US7577838B1 (en) | 2002-12-20 | 2009-08-18 | Alain Rossmann | Hybrid systems for securing digital assets |
| US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
| US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
| US20040250073A1 (en)* | 2003-06-03 | 2004-12-09 | Cukier Johnas I. | Protocol for hybrid authenticated key establishment |
| US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
| US7555558B1 (en) | 2003-08-15 | 2009-06-30 | Michael Frederick Kenrich | Method and system for fault-tolerant transfer of files across a network |
| US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
| US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
| US7702909B2 (en)* | 2003-12-22 | 2010-04-20 | Klimenty Vainstein | Method and system for validating timestamps |
| WO2005109734A1 (en)* | 2004-05-10 | 2005-11-17 | Koninklijke Philips Electronics N.V. | Personal communication apparatus capable of recording transactions secured with biometric data |
| US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
| WO2007020566A1 (en)* | 2005-08-19 | 2007-02-22 | Nxp B.V. | Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation |
| US8265265B2 (en)* | 2005-08-19 | 2012-09-11 | Nxp B.V. | Circuit arrangement and method for RSA key generation |
| GB0613235D0 (en)* | 2006-07-04 | 2006-08-09 | Maidsafe Net Ltd | File system authentication |
| US8090954B2 (en)* | 2007-03-16 | 2012-01-03 | Microsoft Corporation | Prevention of unauthorized forwarding and authentication of signatures |
| US8689003B2 (en) | 2007-06-01 | 2014-04-01 | Adobe Systems Incorporated | System and method for secure password-based authentication |
| US8117447B2 (en)* | 2008-01-10 | 2012-02-14 | Industrial Technology Research Institute | Authentication method employing elliptic curve cryptography |
| CN110035071A (en)* | 2019-03-26 | 2019-07-19 | 南瑞集团有限公司 | A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4453074A (en)* | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
| US4723284A (en)* | 1983-02-14 | 1988-02-02 | Prime Computer, Inc. | Authentication system |
| US4799258A (en)* | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
| US4876716A (en)* | 1986-08-22 | 1989-10-24 | Nec Corporation | Key distribution method |
| US4935962A (en)* | 1988-05-19 | 1990-06-19 | Ncr Corporation | Method and system for authentication |
| US4969189A (en)* | 1988-06-25 | 1990-11-06 | Nippon Telegraph & Telephone Corporation | Authentication system and apparatus therefor |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4759063A (en)* | 1983-08-22 | 1988-07-19 | Chaum David L | Blind signature systems |
| US4885777A (en)* | 1985-09-04 | 1989-12-05 | Hitachi, Ltd. | Electronic transaction system |
| US5218637A (en)* | 1987-09-07 | 1993-06-08 | L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espace | Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization |
| US5016274A (en)* | 1988-11-08 | 1991-05-14 | Silvio Micali | On-line/off-line digital signing |
| US5222140A (en)* | 1991-11-08 | 1993-06-22 | Bell Communications Research, Inc. | Cryptographic method for key agreement and user authentication |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4453074A (en)* | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
| US4723284A (en)* | 1983-02-14 | 1988-02-02 | Prime Computer, Inc. | Authentication system |
| US4799258A (en)* | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
| US4876716A (en)* | 1986-08-22 | 1989-10-24 | Nec Corporation | Key distribution method |
| US4935962A (en)* | 1988-05-19 | 1990-06-19 | Ncr Corporation | Method and system for authentication |
| US4969189A (en)* | 1988-06-25 | 1990-11-06 | Nippon Telegraph & Telephone Corporation | Authentication system and apparatus therefor |
| Title |
|---|
| A. Fiat et al., How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings of CRYPTO 86, A. M. Odlyzko, Ed., LNCS 263, pp. 186 194, 1987.* |
| A. Fiat et al., How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Proceedings of CRYPTO '86, A. M. Odlyzko, Ed., LNCS 263, pp. 186-194, 1987. |
| A. Shamir, An Efficient Identification Scheme Based on Permuted Kernels, Proceedings of CRYPTO 89, G. Brassard, Ed., LNCS 435, pp. 606 609, Apr. 1989.* |
| A. Shamir, An Efficient Identification Scheme Based on Permuted Kernels, Proceedings of CRYPTO '89, G. Brassard, Ed., LNCS 435, pp. 606-609, Apr. 1989. |
| A. Shimizu et al., FEAL Fast Data Encipherment Algorithm, Systems and Computers in Japan, vol. 19, No. 7, pp. 20 34, 1988.* |
| A. Shimizu et al., FEAL-Fast Data Encipherment Algorithm, Systems and Computers in Japan, vol. 19, No. 7, pp. 20-34, 1988. |
| C. P. Schnorr, Efficient Signature Generation by Smart Cards, Journal of Cryptology, vol. 4, No. 3, pp. 161 174, Mar. 1991.* |
| C. P. Schnorr, Efficient Signature Generation by Smart Cards, Journal of Cryptology, vol. 4, No. 3, pp. 161-174, Mar. 1991. |
| M. O. Rabin, Digitalized Signatures and Public Key Functions as Intractable as Factorization, MIT Laboratory for Computer Science, TR 212, Jan. 1979.* |
| N. Koblitz, A Course in Number Theory and Cryptography, Springer Verlag, p. 32, 1987.* |
| National Bureau of Standards, Data Encryption Standard, FIPS PUB 46, 1977.* |
| National Bureau of Standards, Data Encryption Standard, FIPS-PUB-46, 1977. |
| R. C. Rivest et al., A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, vol. 21, No. 2, pp. 120 126, Feb. 1978.* |
| R. C. Rivest et al., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol. 21, No. 2, pp. 120-126, Feb. 1978. |
| S. Even et al. On Line/Off Line Digital Signatures, in Advances in Cryptology CRYPTO 89 Proceedings, G. Brassard (ed.), Lecture Notes in Computer Science, vol. 435, Springer Verlag, pp. 263 275, 1990.* |
| S. Even et al. On-Line/Off-Line Digital Signatures, in Advances in Cryptology-CRYPTO '89 Proceedings, G. Brassard (ed.), Lecture Notes in Computer Science, vol. 435, Springer-Verlag, pp. 263-275, 1990. |
| S. Goldwasser et al., A Digital Signature Scheme Secured Against Adaptive Chosen Message Attacks, SIAM J. COMPUT., vol. 17, No. 2, pp. 281 308, Apr. 1988.* |
| S. Goldwasser et al., A Digital Signature Scheme Secured Against Adaptive Chosen-Message Attacks, SIAM J. COMPUT., vol. 17, No. 2, pp. 281-308, Apr. 1988. |
| S. Miyaguchi, The FEAL Cipher Family, Proceedings of CRYPTO 90, Santa Barbara, Calif., Aug. 1990.* |
| S. Miyaguchi, The FEAL Cipher Family, Proceedings of CRYPTO '90, Santa Barbara, Calif., Aug. 1990. |
| T. Elgamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. on Info. Theory, vol. IT 31, No. 4, pp. 469 472, Jul. 1985.* |
| T. Elgamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Trans. on Info. Theory, vol. IT-31, No. 4, pp. 469-472, Jul. 1985. |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5475758A (en)* | 1993-01-22 | 1995-12-12 | Fujitsu Limited | User authenticating system and method in wide area distributed environment |
| US5414772A (en)* | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
| US6185416B1 (en) | 1993-06-29 | 2001-02-06 | Cellco Partnership | Method and apparatus for fraud control in cellular telephone systems |
| US5950121A (en)* | 1993-06-29 | 1999-09-07 | Airtouch Communications, Inc. | Method and apparatus for fraud control in cellular telephone systems |
| US5555551A (en)* | 1993-06-29 | 1996-09-10 | Airtouch Communications, Inc. | Method and apparatus for fraud control in cellular telephone systems |
| US6219538B1 (en) | 1993-06-29 | 2001-04-17 | Cellco Partnership | Method and apparatus for fraud control in cellular telephone systems |
| US5600725A (en)* | 1993-08-17 | 1997-02-04 | R3 Security Engineering Ag | Digital signature method and key agreement method |
| US5497422A (en)* | 1993-09-30 | 1996-03-05 | Apple Computer, Inc. | Message protection mechanism and graphical user interface therefor |
| US5600722A (en)* | 1993-10-06 | 1997-02-04 | Nippon Telegraph & Telephone Corp. | System and scheme of cipher communication |
| US5491749A (en)* | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks |
| US5491750A (en)* | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
| WO1996025814A1 (en)* | 1994-01-11 | 1996-08-22 | David Chaum | Multi-purpose transaction card system |
| US6434238B1 (en) | 1994-01-11 | 2002-08-13 | Infospace, Inc. | Multi-purpose transaction card system |
| WO1995021495A1 (en)* | 1994-02-01 | 1995-08-10 | Silvio Micali | Method for certifying public keys in a digital signature scheme |
| US5420927A (en)* | 1994-02-01 | 1995-05-30 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
| US5511121A (en)* | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
| DE4416253B4 (en)* | 1994-05-07 | 2005-09-22 | Deutsche Telekom Ag | Method for distributing key information in a manner compatible with data protection |
| DE4416253A1 (en)* | 1994-05-07 | 1995-11-09 | Deutsche Bundespost Telekom | Data protection technique testing authenticity and integrity of coded information |
| EP0682327A3 (en)* | 1994-05-09 | 1999-11-03 | Yeda Research And Development Company, Ltd. | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
| US5515441A (en)* | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
| US5577121A (en)* | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
| US6026167A (en)* | 1994-06-10 | 2000-02-15 | Sun Microsystems, Inc. | Method and apparatus for sending secure datagram multicasts |
| US5557678A (en)* | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
| US5838792A (en)* | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
| US5748735A (en)* | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
| US5588061A (en)* | 1994-07-20 | 1996-12-24 | Bell Atlantic Network Services, Inc. | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
| US5905799A (en)* | 1994-07-20 | 1999-05-18 | Bell Atlantic Network Services, Inc. | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
| US5745573A (en)* | 1994-08-11 | 1998-04-28 | Trusted Information Systems, Inc. | System and method for controlling access to a user secret |
| US5991406A (en)* | 1994-08-11 | 1999-11-23 | Network Associates, Inc. | System and method for data recovery |
| US5956403A (en)* | 1994-08-11 | 1999-09-21 | Network Association, Inc. | System and method for access field verification |
| US5557765A (en)* | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for data recovery |
| US5606609A (en)* | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
| US5633930A (en)* | 1994-09-30 | 1997-05-27 | Electronic Payment Services, Inc. | Common cryptographic key verification in a transaction network |
| US5559887A (en)* | 1994-09-30 | 1996-09-24 | Electronic Payment Service | Collection of value from stored value systems |
| US5737419A (en)* | 1994-11-09 | 1998-04-07 | Bell Atlantic Network Services, Inc. | Computer system for securing communications using split private key asymmetric cryptography |
| US9953328B2 (en) | 1994-11-23 | 2018-04-24 | Contentguard Holdings, Inc. | Method and system for conducting transactions between repositories |
| US20030115144A1 (en)* | 1994-11-23 | 2003-06-19 | Stefik Mark J. | Digital work structure |
| US20040073513A1 (en)* | 1994-11-23 | 2004-04-15 | Contentguard Holdings, Inc. | Method and system for conducting transactions between repositories |
| US20040064417A1 (en)* | 1994-11-23 | 2004-04-01 | Xerox Corporation | Method for controlling use of database content |
| US7970709B2 (en) | 1994-11-23 | 2011-06-28 | Contentguard Holdings, Inc. | Method and apparatus for client customization by executing software parts on plural servers |
| US7809644B2 (en) | 1994-11-23 | 2010-10-05 | Contentguard Holdings, Inc. | Digital work structure |
| US6928419B2 (en) | 1994-11-23 | 2005-08-09 | Contentguard Holdings, Inc. | Method and apparatus for repackaging portions of digital works as new digital works |
| US20100212027A1 (en)* | 1994-11-23 | 2010-08-19 | Contentguard Holdings, Inc. | System and method for rendering content associated with a digital work |
| US7024392B2 (en) | 1994-11-23 | 2006-04-04 | Contentguard Holdings, Inc. | Method for controlling use of database content |
| US7269576B2 (en) | 1994-11-23 | 2007-09-11 | Contentguard Holdings, Inc. | Content rendering apparatus |
| US20040015446A1 (en)* | 1994-11-23 | 2004-01-22 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US7043453B2 (en) | 1994-11-23 | 2006-05-09 | Contentguard Holdings, Inc. | Method and system for conducting transactions between repositories using a repository transaction protocol |
| US20020128972A1 (en)* | 1994-11-23 | 2002-09-12 | Contentguard Holdings, Inc. | Digital works having usage rights and method for creating the same |
| US20060106722A1 (en)* | 1994-11-23 | 2006-05-18 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US20030225698A1 (en)* | 1994-11-23 | 2003-12-04 | Contentguard Holdings, Inc. | Method and apparatus for executing code in accordance with usage rights |
| US20040107166A1 (en)* | 1994-11-23 | 2004-06-03 | Contentguard Holding, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US20060167801A1 (en)* | 1994-11-23 | 2006-07-27 | Contentguard Holdings, Inc. | Method and apparatus for client customization by executing software parts on plural servers |
| US7523072B2 (en) | 1994-11-23 | 2009-04-21 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works |
| US20060190404A1 (en)* | 1994-11-23 | 2006-08-24 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works |
| US6898576B2 (en) | 1994-11-23 | 2005-05-24 | Contentguard Holdings, Inc. | Method and apparatus for executing code in accordance with usage rights |
| US7117180B1 (en) | 1994-11-23 | 2006-10-03 | Contentguard Holdings, Inc. | System for controlling the use of digital works using removable content repositories |
| US6925448B2 (en) | 1994-11-23 | 2005-08-02 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US20030167236A1 (en)* | 1994-11-23 | 2003-09-04 | Contentguard Holdings, Inc. | Method and apparatus for repackaging portions of digital works as new digital works |
| US6920436B2 (en) | 1994-11-23 | 2005-07-19 | Contentguard Holdings, Inc. | Digital work structure |
| US6910022B2 (en) | 1994-11-23 | 2005-06-21 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US7389270B2 (en) | 1994-11-23 | 2008-06-17 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works |
| EP1349044A3 (en)* | 1994-11-23 | 2004-10-27 | ContentGuard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
| US20050149450A1 (en)* | 1994-11-23 | 2005-07-07 | Contentguard Holdings, Inc. | System, method, and device for controlling distribution and use of digital works based on a usage rights grammar |
| US6934693B2 (en) | 1994-11-23 | 2005-08-23 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works |
| US7225160B2 (en) | 1994-11-23 | 2007-05-29 | Contentguard Holdings, Inc. | Digital works having usage rights and method for creating the same |
| US7260556B2 (en) | 1994-11-23 | 2007-08-21 | Contentguard Holdings, Inc. | Content rendering device with usage rights |
| US7266529B2 (en) | 1994-11-23 | 2007-09-04 | Contentguard Holdings, Inc. | Method and apparatus for executing code in accordance with usage rights |
| US6272632B1 (en) | 1995-02-21 | 2001-08-07 | Network Associates, Inc. | System and method for controlling access to a user secret using a key recovery field |
| US8090947B2 (en) | 1995-04-21 | 2012-01-03 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
| US7779259B2 (en) | 1995-04-21 | 2010-08-17 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
| US20080162940A1 (en)* | 1995-04-21 | 2008-07-03 | Vanstone Scott A | Key Agreement and Transport Protocol With Implicit Signatures |
| US20080162938A1 (en)* | 1995-04-21 | 2008-07-03 | Marinus Struik | Key agreement and transport protocol |
| US20100281259A1 (en)* | 1995-04-21 | 2010-11-04 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
| US8578165B2 (en) | 1995-04-21 | 2013-11-05 | Certicom Corp. | Key agreement and transport protocol |
| US8892890B2 (en) | 1995-04-21 | 2014-11-18 | Certicom Corp. | Key agreement and transport protocol |
| US5761305A (en)* | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| US8209533B2 (en) | 1995-04-21 | 2012-06-26 | Certicom Corp. | Key agreement and transport protocol |
| EP1496644A3 (en)* | 1995-04-21 | 2005-02-09 | Certicom Corp. | Method for signature and session key generation |
| US5896455A (en)* | 1995-05-17 | 1999-04-20 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| US5889865A (en)* | 1995-05-17 | 1999-03-30 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
| US5933504A (en)* | 1995-05-18 | 1999-08-03 | Certicom Corp. | Strengthened public key protocol |
| US6563928B1 (en) | 1995-05-18 | 2003-05-13 | Certicom Corp. | Strengthened public key protocol |
| US5778072A (en)* | 1995-07-07 | 1998-07-07 | Sun Microsystems, Inc. | System and method to transparently integrate private key operations from a smart card with host-based encryption services |
| US5812669A (en)* | 1995-07-19 | 1998-09-22 | Jenkins; Lew | Method and system for providing secure EDI over an open network |
| US5819171A (en)* | 1995-08-31 | 1998-10-06 | Cellular Technical Services Co., Inc. | Automated forced call disruption for use with wireless telephone systems |
| US5757924A (en)* | 1995-09-18 | 1998-05-26 | Digital Secured Networks Techolognies, Inc. | Network security device which performs MAC address translation without affecting the IP address |
| US6151679A (en)* | 1995-09-18 | 2000-11-21 | Fortress Technologies Inc. Of Florida | System and method for preventing a first node from being emulated by another node |
| US20020165824A1 (en)* | 1995-10-02 | 2002-11-07 | Silvio Micali | Scalable certificate validation and simplified PKI management |
| US7337315B2 (en) | 1995-10-02 | 2008-02-26 | Corestreet, Ltd. | Efficient certificate revocation |
| US7716486B2 (en) | 1995-10-02 | 2010-05-11 | Corestreet, Ltd. | Controlling group access to doors |
| US8015597B2 (en) | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
| US8732457B2 (en) | 1995-10-02 | 2014-05-20 | Assa Abloy Ab | Scalable certificate validation and simplified PKI management |
| US7353396B2 (en) | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
| US7822989B2 (en) | 1995-10-02 | 2010-10-26 | Corestreet, Ltd. | Controlling access to an area |
| US20050055567A1 (en)* | 1995-10-02 | 2005-03-10 | Phil Libin | Controlling access to an area |
| US7600129B2 (en) | 1995-10-02 | 2009-10-06 | Corestreet, Ltd. | Controlling access using additional data |
| US20050010783A1 (en)* | 1995-10-24 | 2005-01-13 | Phil Libin | Access control |
| US7529928B2 (en) | 1995-10-24 | 2009-05-05 | Corestreet, Ltd. | Certificate revocation system |
| US20050055548A1 (en)* | 1995-10-24 | 2005-03-10 | Silvio Micali | Certificate revocation system |
| US8261319B2 (en) | 1995-10-24 | 2012-09-04 | Corestreet, Ltd. | Logging access attempts to an area |
| US7660994B2 (en) | 1995-10-24 | 2010-02-09 | Corestreet, Ltd. | Access control |
| US6442532B1 (en)* | 1995-11-13 | 2002-08-27 | Transaction Technology Inc. | Wireless transaction and information system |
| US5715518A (en)* | 1996-03-06 | 1998-02-03 | Cellular Technical Services Company, Inc. | Adaptive waveform matching for use in transmitter identification |
| US5604804A (en)* | 1996-04-23 | 1997-02-18 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
| US5717759A (en)* | 1996-04-23 | 1998-02-10 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
| US5638447A (en)* | 1996-05-15 | 1997-06-10 | Micali; Silvio | Compact digital signatures |
| US5610982A (en)* | 1996-05-15 | 1997-03-11 | Micali; Silvio | Compact certification with threshold signatures |
| US8229113B2 (en) | 1996-05-17 | 2012-07-24 | Certicom Corp. | Strengthened public key protocol |
| US8983064B2 (en) | 1996-05-17 | 2015-03-17 | Certicom Corp. | Strengthened public key protocol |
| US20100014663A1 (en)* | 1996-05-17 | 2010-01-21 | Certicom Corp. | Strengthened public key protocol |
| US8953787B2 (en) | 1996-05-17 | 2015-02-10 | Certicom Corp. | Strengthened public key protocol |
| US7567669B2 (en) | 1996-05-17 | 2009-07-28 | Certicom Corp. | Strengthened public key protocol |
| US5893031A (en)* | 1996-06-27 | 1999-04-06 | Cellular Technical Services Company, Inc. | System and method for collection of transmission characteristics |
| US5940751A (en)* | 1996-06-27 | 1999-08-17 | Cellular Technical Services Company, Inc. | System and method for detection of fraud in a wireless telephone system |
| US5956635A (en)* | 1996-07-16 | 1999-09-21 | Cellular Technical Services Company, Inc. | Detection and prevention of channel grabbing in a wireless communications system |
| US8874768B2 (en)* | 1996-07-30 | 2014-10-28 | Round Rocks Research, LLC | Methods for providing security over untrusted networks |
| US20110197068A1 (en)* | 1996-07-30 | 2011-08-11 | Holden James M | Methods for providing security over untrusted networks |
| US5850444A (en)* | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
| DE19640526A1 (en)* | 1996-10-01 | 1998-04-02 | Deutsche Telekom Ag | Process for the transmission of signals |
| US7188361B1 (en) | 1996-10-01 | 2007-03-06 | Deutsche Telekom Ag | Method of transmitting signals |
| US6134431A (en)* | 1996-10-07 | 2000-10-17 | Hitachi, Ltd. | Personal station authentication system and authentication method |
| US5953420A (en)* | 1996-10-25 | 1999-09-14 | International Business Machines Corporation | Method and apparatus for establishing an authenticated shared secret value between a pair of users |
| US5924025A (en)* | 1996-10-25 | 1999-07-13 | Cellular Technical Services Company, Inc. | System and method for detection of redial fraud in a cellular telephone system |
| EP0845761A3 (en)* | 1996-11-21 | 2000-09-13 | Pitney Bowes Inc. | Method for verifying the expected postage security device and an authorized host system |
| EP0845762A3 (en)* | 1996-11-21 | 2000-10-11 | Pitney Bowes Inc. | Method for verifying the expected postal security device in a postal security device |
| US6260144B1 (en) | 1996-11-21 | 2001-07-10 | Pitney Bowes Inc. | Method for verifying the expected postal security device in a postage metering system |
| US6397328B1 (en) | 1996-11-21 | 2002-05-28 | Pitney Bowes Inc. | Method for verifying the expected postage security device and an authorized host system |
| EP0845760A3 (en)* | 1996-11-21 | 2000-07-26 | Pitney Bowes Inc. | Method for verifying the expected postage security device in a host system |
| US6058301A (en)* | 1996-11-27 | 2000-05-02 | Airtouch Communications, Inc. | Cellular fraud prevention using selective roaming |
| US6285871B1 (en) | 1996-11-27 | 2001-09-04 | Cellco Partnership | Cellular fraud prevention using selective roaming |
| WO1998026535A1 (en)* | 1996-12-12 | 1998-06-18 | Intel Corporation | Cryptographically protected paging subsystem |
| GB2334866A (en)* | 1996-12-12 | 1999-09-01 | Intel Corp | Cryptographically protected paging subsystem |
| GB2334866B (en)* | 1996-12-12 | 2001-07-18 | Intel Corp | Cryptographically protected paging subsystem |
| US5875394A (en)* | 1996-12-27 | 1999-02-23 | At & T Wireless Services Inc. | Method of mutual authentication for secure wireless service provision |
| US6240513B1 (en)* | 1997-01-03 | 2001-05-29 | Fortress Technologies, Inc. | Network security device |
| US6292896B1 (en) | 1997-01-22 | 2001-09-18 | International Business Machines Corporation | Method and apparatus for entity authentication and session key generation |
| US6178507B1 (en)* | 1997-02-03 | 2001-01-23 | Certicom Corp. | Data card verification system |
| US8307211B2 (en) | 1997-02-03 | 2012-11-06 | Certicom Corp. | Data card verification system |
| US9990796B2 (en) | 1997-02-03 | 2018-06-05 | Certicom Corp. | Data card verification system |
| US20020174339A1 (en)* | 1997-02-03 | 2002-11-21 | Vanstone Scott A. | Data card verification system |
| US7472276B2 (en) | 1997-02-03 | 2008-12-30 | Certicom Corp. | Data card verification system |
| US20090164792A1 (en)* | 1997-02-03 | 2009-06-25 | Vanstone Scott A | Data card verification system |
| US8966271B2 (en) | 1997-02-03 | 2015-02-24 | Certicom Corp. | Data card verification system |
| US7822987B2 (en) | 1997-02-03 | 2010-10-26 | Certicom Corp. | Data card verification system |
| US20110016324A1 (en)* | 1997-02-03 | 2011-01-20 | Certicom Corp. | Data card verification system |
| US5878122A (en)* | 1997-02-07 | 1999-03-02 | Northern Telecom Limited | Long distance service bureau |
| US5915021A (en)* | 1997-02-07 | 1999-06-22 | Nokia Mobile Phones Limited | Method for secure communications in a telecommunications system |
| US6023689A (en)* | 1997-02-07 | 2000-02-08 | Nokia Mobile Phones Limited | Method for secure communication in a telecommunications system |
| US5956634A (en)* | 1997-02-28 | 1999-09-21 | Cellular Technical Services Company, Inc. | System and method for detection of fraud in a wireless telephone system |
| US5999806A (en)* | 1997-02-28 | 1999-12-07 | Cellular Technical Services Company, Inc. | Waveform collection for use in wireless telephone identification |
| US5999807A (en)* | 1997-02-28 | 1999-12-07 | Cellular Technical Services Company, Inc. | System and method for the verification of authentic telephone numbers in a wireless telephone system |
| US5970405A (en)* | 1997-02-28 | 1999-10-19 | Cellular Technical Services Co., Inc. | Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis |
| US6247129B1 (en) | 1997-03-12 | 2001-06-12 | Visa International Service Association | Secure electronic commerce employing integrated circuit cards |
| US6134597A (en)* | 1997-05-28 | 2000-10-17 | International Business Machines Corporation | CRC hash compressed server object identifier |
| US6052466A (en)* | 1997-08-28 | 2000-04-18 | Telefonaktiebolaget L M Ericsson (Publ) | Encryption of data packets using a sequence of private keys generated from a public key exchange |
| WO1999019844A1 (en)* | 1997-10-08 | 1999-04-22 | Kutalkova Sarka | A method of communication between an external terminal of a bank account user and an internal terminal of a banking system by means of a telephone network and a device for carrying out the method |
| US6760843B1 (en) | 1998-01-20 | 2004-07-06 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
| US6738907B1 (en) | 1998-01-20 | 2004-05-18 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
| US6424701B1 (en)* | 1998-01-30 | 2002-07-23 | Alcatel | Method and equipment for intercepting telephone calls |
| US6408175B1 (en)* | 1998-03-03 | 2002-06-18 | Lg Information & Communications Ltd. | Method of managing mobile station operational parameters |
| US6751735B1 (en) | 1998-03-23 | 2004-06-15 | Novell, Inc. | Apparatus for control of cryptography implementations in third party applications |
| US6532451B1 (en) | 1998-03-23 | 2003-03-11 | Novell, Inc. | Nested strong loader apparatus and method |
| US20030061483A1 (en)* | 1998-03-23 | 2003-03-27 | Novell, Inc. | Nested strong loader apparatus and method |
| US7383442B2 (en) | 1998-03-23 | 2008-06-03 | Novell, Inc. | Nested strong loader apparatus and method |
| US6701433B1 (en) | 1998-03-23 | 2004-03-02 | Novell, Inc. | Method and apparatus for escrowing properties used for accessing executable modules |
| US6615350B1 (en) | 1998-03-23 | 2003-09-02 | Novell, Inc. | Module authentication and binding library extensions |
| US6405923B1 (en) | 1998-05-08 | 2002-06-18 | Giesecke & Devrient Gmbh | Method for secure distribution of data |
| DE19820605A1 (en)* | 1998-05-08 | 1999-11-11 | Giesecke & Devrient Gmbh | Method for secure distribution of software |
| US20070147607A1 (en)* | 1998-10-14 | 2007-06-28 | Johnson Donald B | Key validation scheme |
| US8116451B2 (en) | 1998-10-14 | 2012-02-14 | Certicom Corporation | Key validation scheme |
| US8594324B2 (en) | 1998-10-14 | 2013-11-26 | Certicom Corp. | Key validation scheme |
| US7215773B1 (en) | 1998-10-14 | 2007-05-08 | Certicom.Corp. | Key validation scheme |
| US6178506B1 (en) | 1998-10-23 | 2001-01-23 | Qualcomm Inc. | Wireless subscription portability |
| US6453159B1 (en)* | 1999-02-25 | 2002-09-17 | Telxon Corporation | Multi-level encryption system for wireless network |
| US6526506B1 (en) | 1999-02-25 | 2003-02-25 | Telxon Corporation | Multi-level encryption access point for wireless network |
| US6349338B1 (en)* | 1999-03-02 | 2002-02-19 | International Business Machines Corporation | Trust negotiation in a client/server data processing network using automatic incremental credential disclosure |
| US6839553B2 (en) | 1999-03-03 | 2005-01-04 | Lg Information & Communications, Ltd. | Method of managing mobile station operational parameters |
| US6886095B1 (en) | 1999-05-21 | 2005-04-26 | International Business Machines Corporation | Method and apparatus for efficiently initializing secure communications among wireless devices |
| US7409704B1 (en)* | 1999-07-15 | 2008-08-05 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for local policy enforcement for internet service providers |
| KR100619005B1 (en)* | 1999-11-25 | 2006-08-31 | 삼성전자주식회사 | Authentication method for establishing connection between devices |
| US20140235207A1 (en)* | 2000-05-26 | 2014-08-21 | Ipcom Gmbh & Co. Kg | Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network |
| US9100827B2 (en)* | 2000-05-26 | 2015-08-04 | Ipcom Gmbh & Co. Kg | Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network |
| US20020107798A1 (en)* | 2000-06-08 | 2002-08-08 | Patrice Hameau | Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor |
| US7602920B2 (en)* | 2000-06-08 | 2009-10-13 | Cp8 Technologies | Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor |
| US8204945B2 (en) | 2000-06-19 | 2012-06-19 | Stragent, Llc | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
| US8272060B2 (en) | 2000-06-19 | 2012-09-18 | Stragent, Llc | Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses |
| US20020169988A1 (en)* | 2000-12-22 | 2002-11-14 | Vandergeest Ron J. | Method and apparatus for providing user authentication using a back channel |
| US7765580B2 (en) | 2000-12-22 | 2010-07-27 | Entrust, Inc. | Method and apparatus for providing user authentication using a back channel |
| US20020081994A1 (en)* | 2000-12-27 | 2002-06-27 | Kabushiki Kaisha Toshiba. | Communication apparatus, and authentication method of the same |
| US20020087481A1 (en)* | 2000-12-29 | 2002-07-04 | Shlomi Harif | System, method and program for enabling an electronic commerce heterogeneous network |
| US20020087483A1 (en)* | 2000-12-29 | 2002-07-04 | Shlomi Harif | System, method and program for creating and distributing processes in a heterogeneous network |
| US20020162019A1 (en)* | 2001-04-25 | 2002-10-31 | Berry Michael C. | Method and system for managing access to services |
| US20020162002A1 (en)* | 2001-04-25 | 2002-10-31 | Gunter Carl A. | Method and system for controlling access to services |
| US20050210263A1 (en)* | 2001-04-25 | 2005-09-22 | Levas Robert G | Electronic form routing and data capture system and method |
| US20020158904A1 (en)* | 2001-04-25 | 2002-10-31 | Gunter Carl A. | Method for automatically generating list of meeting participants and delegation permission |
| US20030236977A1 (en)* | 2001-04-25 | 2003-12-25 | Levas Robert George | Method and system for providing secure access to applications |
| US20050086540A1 (en)* | 2001-04-25 | 2005-04-21 | Probaris Technologies, Inc. | Method for automatically generating list of meeting participants and delegating permission |
| US20020162004A1 (en)* | 2001-04-25 | 2002-10-31 | Gunter Carl A. | Method and system for managing access to services |
| US6885388B2 (en) | 2001-04-25 | 2005-04-26 | Probaris Technologies Inc. | Method for automatically generating list of meeting participants and delegation permission |
| US20030005327A1 (en)* | 2001-06-29 | 2003-01-02 | Julian Durand | System for protecting copyrighted materials |
| WO2003003213A1 (en)* | 2001-06-29 | 2003-01-09 | Nokia Corporation | System for protecting copyrighted materials |
| KR20030008453A (en)* | 2001-07-18 | 2003-01-29 | 주식회사 더블유에스랩 | Method of inter-authentication and security service using user-password in SMS for CDMA network |
| US20030200447A1 (en)* | 2001-08-17 | 2003-10-23 | Lotta Almroth | Identification system |
| US20030065956A1 (en)* | 2001-09-28 | 2003-04-03 | Abhijit Belapurkar | Challenge-response data communication protocol |
| US20040005059A1 (en)* | 2001-11-05 | 2004-01-08 | Yoshihiko Suzuki | Correspondence education system and correspondence education method |
| US20030172299A1 (en)* | 2002-03-05 | 2003-09-11 | Gunter Carl A. | Method and system for maintaining secure access to web server services using permissions |
| US20030182559A1 (en)* | 2002-03-22 | 2003-09-25 | Ian Curry | Secure communication apparatus and method for facilitating recipient and sender activity delegation |
| KR100449572B1 (en)* | 2002-05-22 | 2004-09-22 | 주식회사 케이티프리텔 | Method and system for performing mutual authenticating between mobile terminal and server |
| KR20040017487A (en)* | 2002-08-21 | 2004-02-27 | 이창우 | Authenticating method using public key cryptosystem |
| KR20040042123A (en)* | 2002-11-13 | 2004-05-20 | 주식회사 퓨쳐시스템 | Portable authentication apparatus and authentication method using the same |
| US7657751B2 (en) | 2003-05-13 | 2010-02-02 | Corestreet, Ltd. | Efficient and secure data currentness systems |
| US20040237031A1 (en)* | 2003-05-13 | 2004-11-25 | Silvio Micali | Efficient and secure data currentness systems |
| US20050154918A1 (en)* | 2003-11-19 | 2005-07-14 | David Engberg | Distributed delegated path discovery and validation |
| US8707030B2 (en) | 2003-11-19 | 2014-04-22 | Corestreet, Ltd. | Distributed delegated path discovery and validation |
| US7966487B2 (en) | 2004-01-09 | 2011-06-21 | Corestreet, Ltd. | Communication-efficient real time credentials for OCSP and distributed OCSP |
| US20050154879A1 (en)* | 2004-01-09 | 2005-07-14 | David Engberg | Batch OCSP and batch distributed OCSP |
| US20050204139A1 (en)* | 2004-03-10 | 2005-09-15 | Helland Patrick J. | Service broker security |
| US7673141B2 (en) | 2004-05-28 | 2010-03-02 | Sap Aktiengesellschaft | Client authentication using a challenge provider |
| EP1601154A1 (en)* | 2004-05-28 | 2005-11-30 | Sap Ag | Client authentication using a challenge provider |
| EP1601153A3 (en)* | 2004-05-28 | 2006-01-04 | Sap Ag | Client authentication using a challenge provider |
| US20050268096A1 (en)* | 2004-05-28 | 2005-12-01 | Roger Kilian-Kehr | Client authentication using a challenge provider |
| US7509120B2 (en)* | 2004-09-07 | 2009-03-24 | Research In Motion Limited | System and method for updating message trust status |
| US20060053291A1 (en)* | 2004-09-07 | 2006-03-09 | Brown Michael K | System and method for updating message trust status |
| US8385887B2 (en) | 2004-09-07 | 2013-02-26 | Research In Motion Limited | System and method for updating message trust status |
| US20090210718A1 (en)* | 2004-09-07 | 2009-08-20 | Research In Motion Limited | System and method for updating message trust status |
| US10476677B2 (en) | 2004-09-07 | 2019-11-12 | Blackberry Limited | System and method for updating message trust status |
| US8831569B2 (en)* | 2004-09-07 | 2014-09-09 | Blackberry Limited | System and method for updating message trust status |
| US20060075234A1 (en)* | 2004-10-04 | 2006-04-06 | Samsung Electronics Co., Ltd. | Method of authenticating device using broadcast cryptography |
| US20060093138A1 (en)* | 2004-10-29 | 2006-05-04 | Alain Durand | Secure authenticated channel |
| US7545932B2 (en)* | 2004-10-29 | 2009-06-09 | Thomson Licensing | Secure authenticated channel |
| US20060097843A1 (en)* | 2004-11-10 | 2006-05-11 | Phil Libin | Actuating a security system using a wireless device |
| US7205882B2 (en) | 2004-11-10 | 2007-04-17 | Corestreet, Ltd. | Actuating a security system using a wireless device |
| US20060271915A1 (en)* | 2005-05-24 | 2006-11-30 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
| US20060271493A1 (en)* | 2005-05-24 | 2006-11-30 | Contentguard Holdings, Inc. | Method and apparatus for executing code in accordance with usage rights |
| US8132005B2 (en)* | 2005-07-07 | 2012-03-06 | Nokia Corporation | Establishment of a trusted relationship between unknown communication parties |
| US20070011453A1 (en)* | 2005-07-07 | 2007-01-11 | Nokia Corporation | Establishment of a trusted relationship between unknown communication parties |
| US20070028952A1 (en)* | 2005-08-05 | 2007-02-08 | Outdoor Sleep System, Llc | Sleeping bag and system |
| USRE49334E1 (en) | 2005-10-04 | 2022-12-13 | Hoffberg Family Trust 2 | Multifactorial optimization system and method |
| US20070211893A1 (en)* | 2006-03-09 | 2007-09-13 | Motorola, Inc. | Encryption and verification using partial public key |
| US7664259B2 (en)* | 2006-03-09 | 2010-02-16 | Motorola, Inc. | Encryption and verification using partial public key |
| US11212583B2 (en) | 2006-06-16 | 2021-12-28 | Synamedia Limited | Securing media content using interchangeable encryption key |
| US9277295B2 (en) | 2006-06-16 | 2016-03-01 | Cisco Technology, Inc. | Securing media content using interchangeable encryption key |
| US7760873B2 (en)* | 2006-06-30 | 2010-07-20 | Intel Corporation | Method and a system for a quick verification rabin signature scheme |
| US20080005030A1 (en)* | 2006-06-30 | 2008-01-03 | Scientific-Atlanta, Inc. | Secure Escrow and Recovery of Media Device Content Keys |
| US20080002825A1 (en)* | 2006-06-30 | 2008-01-03 | Shay Gueron | Method and a system for a quick verification rabin signature scheme |
| US9137480B2 (en)* | 2006-06-30 | 2015-09-15 | Cisco Technology, Inc. | Secure escrow and recovery of media device content keys |
| US8265600B2 (en) | 2006-10-19 | 2012-09-11 | Qualcomm Incorporated | System and method for authenticating remote server access |
| US20080098225A1 (en)* | 2006-10-19 | 2008-04-24 | Mark Wayne Baysinger | System and method for authenticating remote server access |
| US7979054B2 (en)* | 2006-10-19 | 2011-07-12 | Qualcomm Incorporated | System and method for authenticating remote server access |
| US20080256358A1 (en)* | 2007-04-12 | 2008-10-16 | Xerox Corporation | System and method for managing digital certificates on a remote device |
| US8261080B2 (en)* | 2007-04-12 | 2012-09-04 | Xerox Corporation | System and method for managing digital certificates on a remote device |
| US8291221B2 (en)* | 2007-08-14 | 2012-10-16 | Yeda Research & Development Co. Ltd. | Method and apparatus for implementing a novel one-way hash function on highly constrained devices such as RFID tags |
| US20130003973A1 (en)* | 2007-08-14 | 2013-01-03 | Yeda Research & Development Co. Ltd. | Method and apparatus for implementing a novel one-way hash function on highly constrained devices such as rfid tags |
| WO2009023550A1 (en)* | 2007-08-14 | 2009-02-19 | Yeda Research & Development Co. Ltd. | A method and apparatus for implementing a novel one-way hash function on highly constrained devices such as rfid tags |
| US20110271105A1 (en)* | 2007-08-14 | 2011-11-03 | Yeda Research & Development Co. Ltd. | Method and apparatus for implementing a novel one-way hash function on highly constrained devices such as rfid tags |
| US20090150671A1 (en)* | 2007-12-06 | 2009-06-11 | Hiroshi Abe | Communication system and communication terminal device |
| US8666408B2 (en) | 2008-07-15 | 2014-03-04 | Lg Electronics Inc. | Method of supporting location privacy |
| US20120172002A1 (en)* | 2008-07-15 | 2012-07-05 | Lg Electronics Inc. | Method of supporting location privacy |
| US8676198B2 (en)* | 2008-07-15 | 2014-03-18 | Lg Electronics Inc. | Method of supporting location privacy |
| US20100067698A1 (en)* | 2008-09-10 | 2010-03-18 | Lg Electronics Inc. | Method for selectively encrypting control signal |
| US8582771B2 (en) | 2008-09-10 | 2013-11-12 | Lg Electronics Inc. | Method for selectively encrypting control signal |
| US20110191129A1 (en)* | 2010-02-04 | 2011-08-04 | Netzer Moriya | Random Number Generator Generating Random Numbers According to an Arbitrary Probability Density Function |
| US20110213711A1 (en)* | 2010-03-01 | 2011-09-01 | Entrust, Inc. | Method, system and apparatus for providing transaction verification |
| US20150195275A1 (en)* | 2010-10-06 | 2015-07-09 | Prima Cinema, Inc. | Secure device authentication protocol |
| US8656484B2 (en) | 2010-12-28 | 2014-02-18 | Authernative, Inc. | System and method for mutually authenticated cryptographic key exchange using matrices |
| US8621227B2 (en) | 2010-12-28 | 2013-12-31 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
| US9191378B2 (en)* | 2012-02-27 | 2015-11-17 | Kabushiki Kaisha Toshiba | Communication apparatus and communication method |
| US20130227290A1 (en)* | 2012-02-27 | 2013-08-29 | Kabushiki Kaisha Toshiba | Communication Apparatus and Communication Method |
| EP2940883A3 (en)* | 2014-04-29 | 2016-01-27 | LSIS Co., Ltd. | Power system |
| US9603014B2 (en) | 2014-04-29 | 2017-03-21 | Lsis Co., Ltd. | Power system |
| US11831787B2 (en) | 2015-05-03 | 2023-11-28 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
| US10205598B2 (en)* | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
| WO2017065903A1 (en)* | 2015-10-14 | 2017-04-20 | Sony Interactive Entertainment America Llc | Fast multicast messaging encryption and authentication |
| US10171479B2 (en) | 2015-10-14 | 2019-01-01 | Sony Interactive Entertainment America Llc | Fast multicast messaging encryption and authentication |
| US9843592B2 (en) | 2015-10-14 | 2017-12-12 | Sony Interactive Entertainment America Llc | Fast multicast messaging encryption and authentication |
| US10460083B2 (en) | 2015-11-04 | 2019-10-29 | Screening Room Media, Inc. | Digital credential system |
| US10339278B2 (en) | 2015-11-04 | 2019-07-02 | Screening Room Media, Inc. | Monitoring nearby mobile computing devices to prevent digital content misuse |
| US10417393B2 (en) | 2015-11-04 | 2019-09-17 | Screening Room Media, Inc. | Detecting digital content misuse based on digital content usage clusters |
| US10423762B2 (en) | 2015-11-04 | 2019-09-24 | Screening Room Media, Inc. | Detecting digital content misuse based on know violator usage clusters |
| US10430560B2 (en) | 2015-11-04 | 2019-10-01 | Screening Room Media, Inc. | Monitoring digital content usage history to prevent digital content misuse |
| US12216743B2 (en) | 2015-11-04 | 2025-02-04 | Sr Labs, Inc. | Pairing devices to prevent digital content misuse |
| US10395011B2 (en) | 2015-11-04 | 2019-08-27 | Screening Room Media, Inc. | Monitoring location of a client-side digital content delivery device to prevent digital content misuse |
| US10409964B2 (en) | 2015-11-04 | 2019-09-10 | Screening Room Media, Inc. | Pairing devices to prevent digital content misuse |
| US11941089B2 (en) | 2015-11-04 | 2024-03-26 | Sr Labs, Inc. | Pairing devices to prevent digital content misuse |
| US11227031B2 (en) | 2015-11-04 | 2022-01-18 | Screening Room Media, Inc. | Pairing devices to prevent digital content misuse |
| US11853403B2 (en) | 2015-11-04 | 2023-12-26 | Sr Labs, Inc. | Pairing devices to prevent digital content misuse |
| US10129029B2 (en)* | 2016-06-16 | 2018-11-13 | International Business Machines Corporation | Proofs of plaintext knowledge and group signatures incorporating same |
| US20170366349A1 (en)* | 2016-06-16 | 2017-12-21 | International Business Machines Corporation | Proofs of Plaintext Knowledge and Group Signatures Incorporating Same |
| US9973342B2 (en)* | 2016-06-16 | 2018-05-15 | International Business Machines Corporation | Authentication via group signatures |
| US10452819B2 (en) | 2017-03-20 | 2019-10-22 | Screening Room Media, Inc. | Digital credential system |
| Publication number | Publication date |
|---|---|
| EP0691055A4 (en) | 1998-05-06 |
| EP0691055B1 (en) | 2000-12-13 |
| US5406628A (en) | 1995-04-11 |
| CA2157011C (en) | 1999-03-30 |
| DE69426416D1 (en) | 2001-01-18 |
| JPH08507619A (en) | 1996-08-13 |
| EP0691055A1 (en) | 1996-01-10 |
| CA2157011A1 (en) | 1994-09-15 |
| WO1994021067A1 (en) | 1994-09-15 |
| DE69426416T2 (en) | 2001-07-26 |
| Publication | Publication Date | Title |
|---|---|---|
| US5299263A (en) | Two-way public key authentication and key agreement for low-cost terminals | |
| US5222140A (en) | Cryptographic method for key agreement and user authentication | |
| US5150411A (en) | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction | |
| Juang | Efficient password authenticated key agreement using smart cards | |
| Beller et al. | Privacy and authentication on a portable communications system | |
| CA2596500C (en) | Method and structure for challenge-response signatures and high-performance secure diffie-hellman protocols | |
| US5588061A (en) | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |
| US5796833A (en) | Public key sterilization | |
| JP2606419B2 (en) | Cryptographic communication system and cryptographic communication method | |
| US5313521A (en) | Key distribution protocol for file transfer in the local area network | |
| US7221758B2 (en) | Practical non-malleable public-key cryptosystem | |
| Boyd | Modern data encryption | |
| CN110519226B (en) | Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate | |
| Bellare et al. | Translucent cryptography—an alternative to key escrow, and its implementation via fractional oblivious transfer | |
| Shimbo et al. | Cryptanalysis of several conference key distribution schemes | |
| Kwon | Virtual software tokens-a practical way to secure PKI roaming | |
| Preneel et al. | Cryptographic hash functions: an overview | |
| Shao | Cryptographic systems using a self-certified public key based on discrete logarithms | |
| Ki et al. | Privacy-enhanced deniable authentication e-mail service | |
| Constantinescu | Authentication protocol based on ellipitc curve cryptography | |
| Kwon et al. | A forward-secure e-mail protocol without certificated public keys | |
| Shim | Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions | |
| Kim et al. | Secure authenticated key exchange protocol based on EC using signcryption scheme | |
| Lim et al. | Authenticated session keys and their server-aided computation | |
| Laud et al. | Privacy-preserving server-supported decryption |
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment | Owner name:BELL COMMUNICATIONS RESEARCH, INC., NEW JERSEY Free format text:ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:BELLER, MICHAEL J.;YACOBI, YACOV;REEL/FRAME:006480/0176;SIGNING DATES FROM 19930302 TO 19930303 | |
| STCF | Information on status: patent grant | Free format text:PATENTED CASE | |
| FEPP | Fee payment procedure | Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY | |
| FPAY | Fee payment | Year of fee payment:4 | |
| AS | Assignment | Owner name:TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text:CHANGE OF NAME;ASSIGNOR:BELL COMMUNICATIONS RESEARCH, INC.;REEL/FRAME:010263/0311 Effective date:19990316 | |
| FPAY | Fee payment | Year of fee payment:8 | |
| AS | Assignment | Owner name:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT Free format text:SECURITY AGREEMENT;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:015886/0001 Effective date:20050315 | |
| FPAY | Fee payment | Year of fee payment:12 | |
| AS | Assignment | Owner name:TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text:TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:019520/0174 Effective date:20070629 Owner name:TELCORDIA TECHNOLOGIES, INC.,NEW JERSEY Free format text:TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:019520/0174 Effective date:20070629 | |
| AS | Assignment | Owner name:WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT, DEL Free format text:SECURITY AGREEMENT;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:019562/0309 Effective date:20070629 Owner name:WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT,DELA Free format text:SECURITY AGREEMENT;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:019562/0309 Effective date:20070629 | |
| FEPP | Fee payment procedure | Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text:PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY | |
| AS | Assignment | Owner name:BELL COMMUNICATIONS RESEARCH, INC., NEW JERSEY Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BELLER, MICHAEL J.;YACOBI, YACOV;REEL/FRAME:022288/0991;SIGNING DATES FROM 20090209 TO 20090211 | |
| AS | Assignment | Owner name:TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text:RELEASE OF SECURITY INTEREST;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:022408/0410 Effective date:20090220 Owner name:TELCORDIA TECHNOLOGIES, INC.,NEW JERSEY Free format text:RELEASE OF SECURITY INTEREST;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:022408/0410 Effective date:20090220 | |
| AS | Assignment | Owner name:TELCORDIA LICENSING COMPANY LLC, NEW JERSEY Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:022878/0821 Effective date:20090616 | |
| AS | Assignment | Owner name:TELCORDIA TECHNOLOGIES, INC.,NEW JERSEY Free format text:RELEASE;ASSIGNOR:WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT;REEL/FRAME:024515/0622 Effective date:20100430 Owner name:TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text:RELEASE;ASSIGNOR:WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT;REEL/FRAME:024515/0622 Effective date:20100430 | |
| AS | Assignment | Owner name:TTI INVENTIONS C LLC, DELAWARE Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELCORDIA LICENSING COMPANY LLC;REEL/FRAME:025331/0854 Effective date:20100128 |